malicious software
-
Up to 100 malicious artificial intelligence (AI)/machine learning (ML) models have been discovered by open-source platforms
Up to 100 malicious artificial intelligence (AI)/machine learning (ML) models have been found in the Hugging Face platform.
-
National security: cyberwarfare methodology and case studies
In the context of evolving modern conflicts, cyberwarfare methodologies have become a powerful tool in the arsenal of states, hacktivists and cybercriminals. This paper provides a comprehensive analysis of the methodologies employed in the field of cyber warfare. By delving into techniques, strategies and tactics, we aim to reveal the multifaceted nature of cyber warfare.
-
Malvertising on Google targets Chinese users with fake spoofing apps
Recently, a series of malicious advertisements targeting Chinese-speaking users appeared on Google platforms, enticing users to download fake communication applications, which were actually malware containing Remote Administration Trojans (RATs). These ads were found to link to fake websites hosted on Google Docs or Google Sites and spread through Google infrastructure.
-
Malware Exploits Google Multiple Sign-On Vulnerability to Maintain Access After Password Reset
The information-stealing malware is actively utilizing an unspecified Google OAuth endpoint called MultiLogin to hijack user sessions and allow users to continue accessing Google services even after resetting their passwords.
-
Crypto wallet Ledger supply chain vulnerability led to the theft of $600,000 in virtual assets
A supply chain attack on crypto hardware wallet manufacturer Ledger resulted in the theft of $600,000 in crypto assets. The attacker obtained Ledger's npm account through a phishing attack on a resigned employee, and uploaded a malicious version of the Connect Kit module. These malicious versions spread cryptocurrency-stealing malware to other applications that rely on the module, creating software supply chain vulnerabilities.
-
The rise of ransomware as a service (RaaS) users face more severe threats
In the evolving world of cybersecurity, ransomware attacks have become a serious and widespread threat. Among the different forms of ransomware, a trend called Ransomware-as-a-Service (RaaS) is becoming increasingly prominent. This worrying development changes the cybercrime landscape, enabling individuals with limited technical capabilities to carry out destructive attacks.